Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,960)
  • Open Access

    ARTICLE

    Adaptive Predefined-Time Backstepping Control for Grid Connected Photovoltaic Inverter

    Jiarui Zhang1, Dan Liu2,*, Kan Cao2, Ping Xiong2, Xiaotong Ji3, Yanze Xu1, Yunfei Mu1

    Energy Engineering, Vol.121, No.8, pp. 2065-2083, 2024, DOI:10.32604/ee.2024.050342

    Abstract The system performance of grid-connected photovoltaic (PV) has a serious impact on the grid stability. To improve the control performance and shorten the convergence time, a predefined-time controller based on backstepping technology and dynamic surface control is formulated for the inverter in the grid-connected photovoltaic. The time-varying tuning functions are introduced into state-tracking errors to realize the predefined-time control effect. To address the “computational explosion problem” in the design process of backstepping control, dynamic surface control is adopted to avoid the analytical calculations of virtual control. The disturbances of the PV system are estimated and More >

  • Open Access

    REVIEW

    Maximum Power Point Tracking Technology for PV Systems: Current Status and Perspectives

    Bo Yang1,2, Rui Xie1, Zhengxun Guo3,4,*

    Energy Engineering, Vol.121, No.8, pp. 2009-2022, 2024, DOI:10.32604/ee.2024.049423

    Abstract Maximum power point tracking (MPPT) technology plays a key role in improving the energy conversion efficiency of photovoltaic (PV) systems, especially when multiple local maximum power points (LMPPs) occur under partial shading conditions (PSC). It is necessary to modify the operating point efficiently and accurately with the help of MPPT technology to maximize the collected power. Even though a lot of research has been carried out and impressive progress achieved for MPPT technology, it still faces some challenges and dilemmas. Firstly, the mathematical model established for PV cells is not precise enough. Second, the existing… More > Graphic Abstract

    Maximum Power Point Tracking Technology for PV Systems: Current Status and Perspectives

  • Open Access

    RETRACTION

    Retraction: Deep Belief Network for Lung Nodule Segmentation and Cancer Detection

    Computer Systems Science and Engineering Editorial Office

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1083-1083, 2024, DOI:10.32604/csse.2024.054265

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: Applying Customized Convolutional Neural Network to Kidney Image Volumes for Kidney Disease Detection

    Ali Altalbe1,2,*, Abdul Rehman Javed3

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1075-1081, 2024, DOI:10.32604/csse.2024.054179

    Abstract This article has no abstract. More >

  • Open Access

    REVIEW

    IoMT-Based Healthcare Systems: A Review

    Tahir Abbas1,*, Ali Haider Khan2, Khadija Kanwal3, Ali Daud4,*, Muhammad Irfan5, Amal Bukhari6, Riad Alharbey6

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 871-895, 2024, DOI:10.32604/csse.2024.049026

    Abstract The integration of the Internet of Medical Things (IoMT) and the Internet of Things (IoT), which has revolutionized patient care through features like remote critical care and real-time therapy, is examined in this study in response to the changing healthcare landscape. Even with these improvements, security threats are associated with the increased connectivity of medical equipment, which calls for a thorough assessment. With a primary focus on addressing security and performance enhancement challenges, the research classifies current IoT communication devices, examines their applications in IoMT, and investigates important aspects of IoMT devices in healthcare. The More >

  • Open Access

    ARTICLE

    Intelligent Image Text Detection via Pixel Standard Deviation Representation

    Sana Sahar Guia1, Abdelkader Laouid1, Mohammad Hammoudeh2,*, Mostafa Kara1,3

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 915-935, 2024, DOI:10.32604/csse.2024.046414

    Abstract Artificial intelligence has been involved in several domains. Despite the advantages of using artificial intelligence techniques, some crucial limitations prevent them from being implemented in specific domains and locations. The accuracy, poor quality of gathered data, and processing time are considered major concerns in implementing machine learning techniques, certainly in low-end smart devices. This paper aims to introduce a novel pre-treatment technique dedicated to image text detection that uses the images’ pixel divergence and similarity to reduce the image size. Mitigating the image size while keeping its features improves the model training time with an… More >

  • Open Access

    ARTICLE

    MG-YOLOv5s: A Faster and Stronger Helmet Detection Algorithm

    Zerui Xiao, Wei Liu, Zhiwei Ye*, Jiatang Yuan, Shishi Liu

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1009-1029, 2024, DOI:10.32604/csse.2023.040475

    Abstract Nowadays, construction site safety accidents are frequent, and wearing safety helmets is essential to prevent head injuries caused by object collisions and falls. However, existing helmet detection algorithms have several drawbacks, including a complex structure with many parameters, high calculation volume, and poor detection of small helmets, making deployment on embedded or mobile devices difficult. To address these challenges, this paper proposes a YOLOv5-based multi-head detection safety helmet detection algorithm that is faster and more robust for detecting helmets on construction sites. By replacing the traditional DarkNet backbone network of YOLOv5s with a new backbone… More >

  • Open Access

    ARTICLE

    Deep Learning: A Theoretical Framework with Applications in Cyberattack Detection

    Kaveh Heidary*

    Journal on Artificial Intelligence, Vol.6, pp. 153-175, 2024, DOI:10.32604/jai.2024.050563

    Abstract This paper provides a detailed mathematical model governing the operation of feedforward neural networks (FFNN) and derives the backpropagation formulation utilized in the training process. Network protection systems must ensure secure access to the Internet, reliability of network services, consistency of applications, safeguarding of stored information, and data integrity while in transit across networks. The paper reports on the application of neural networks (NN) and deep learning (DL) analytics to the detection of network traffic anomalies, including network intrusions, and the timely prevention and mitigation of cyberattacks. Among the most prevalent cyber threats are R2L,… More >

  • Open Access

    ARTICLE

    Analyzing the Impact of Scene Transitions on Indoor Camera Localization through Scene Change Detection in Real-Time

    Muhammad S. Alam1,5,*, Farhan B. Mohamed1,3, Ali Selamat2, Faruk Ahmed4, AKM B. Hossain6,7

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 417-436, 2024, DOI:10.32604/iasc.2024.051999

    Abstract Real-time indoor camera localization is a significant problem in indoor robot navigation and surveillance systems. The scene can change during the image sequence and plays a vital role in the localization performance of robotic applications in terms of accuracy and speed. This research proposed a real-time indoor camera localization system based on a recurrent neural network that detects scene change during the image sequence. An annotated image dataset trains the proposed system and predicts the camera pose in real-time. The system mainly improved the localization performance of indoor cameras by more accurately predicting the camera More >

  • Open Access

    ARTICLE

    Intrusion Detection System for Smart Industrial Environments with Ensemble Feature Selection and Deep Convolutional Neural Networks

    Asad Raza1,*, Shahzad Memon1, Muhammad Ali Nizamani1, Mahmood Hussain Shah2

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 545-566, 2024, DOI:10.32604/iasc.2024.051779

    Abstract Smart Industrial environments use the Industrial Internet of Things (IIoT) for their routine operations and transform their industrial operations with intelligent and driven approaches. However, IIoT devices are vulnerable to cyber threats and exploits due to their connectivity with the internet. Traditional signature-based IDS are effective in detecting known attacks, but they are unable to detect unknown emerging attacks. Therefore, there is the need for an IDS which can learn from data and detect new threats. Ensemble Machine Learning (ML) and individual Deep Learning (DL) based IDS have been developed, and these individual models achieved… More >

Displaying 1-10 on page 1 of 2960. Per Page